Applications for Preservation and Production in our Digital World
|
|
- Godwin Foster
- 5 years ago
- Views:
Transcription
1 Applications for Preservation and Production in our Digital World Gavin W. Manes, Ph.D. President, Digital Forensics Professionals, Inc. Research Assistant Professor, The University of Tulsa Background Gavin Manes Ph.D. Founder of Oklahoma Digital Forensics Professionals, Inc. (OKDFP) Research assistant professor of computer science at the University of Tulsa Center for Information Security Briefed the White House, National Security Council, Internal Revenue Service, FBI, and Pentagon University of Tulsa Leading institute for information assurance and digital forensics Operates forensics center with OSBI, Secret Service, and FBI OKDFP was first company commercialized via the Board of Trustees Technology Transfer Initiative 1
2 It is difficult to deny the global impact of electronic communication on business. Over 90 percent of all information is in electronic format.» The Digital Evidence Project (American Bar Association) Discussion areas: Preservation and Production Digital Forensics Preservation and Production Lawyers and judges interpreted the term "documents" to include electronically stored information because it was obviously improper to allow a party to evade discovery obligations on the basis that the label had not kept pace with changes in information technology Amendment Federal Rules of Civil Procedure, Rule 34 2
3 Challenges Legal Number one litigation problem is preserving and producing digital evidence Fulbright survey of corporate counsel Eighty six percent (86%) of corporate or in-house legal departments lack e-discovery plans or policies 2005 EDDix corporate litigation readiness study Rules and regulations 2006 amendments to Federal Rules of Civil Procedure Responsibilities Obligation to preserve evidence Obligation to preserve evidence begins the moment you knew or should have known the evidence was potentially relevant to future litigation - Zubulake v USB Outside Discovery request Preservation letter Litigation filed Intrusion Inside Harassment Whistleblower Employee separation Intellectual property 3
4 Digital Devices Computers, Servers and Network Devices Hard drives Internet logs Chat history Hacking, etc. Removable Media Floppy disk CD/DVD-Rs Media cards Removable hard disks, etc. Portable Electronic Devices MP3 players GPS systems Cell phones PDAs, etc. Digital Cameras Photographs Time stamps Metadata Faxes and Printers Fax communication history Print logs, etc. Communications Devices Voice mail PBX Call records, etc. Surveillance / DVR Equipment Automobiles Case Law Coleman Holdings, Inc. v Morgan Stanley & Co., Inc. Morgan Stanley preservation abuses: Overwriting after 12 months SEC regulations require accessible for two years Failing to conduct proper searches for backup tapes Court ordered that: Abuses would be read to the jury by the court Plaintiff could argue concealment was evidence of malice Burden of persuasion was switched from plaintiff to the defendant Jury awarded for plaintiff punitive and compensatory damages in excess of $1.45 billion 4
5 New Federal Rules of Civil Procedure Planning for discovery Rule 16(b)(5) & (6): Pretrial conferences 26(f): Specification of form Discoverable documents Rule 34: Confirming the document for e-discovery Burden and cost Rule 26: Accessible vs. inaccessible data Privileged document protection Rule 26: Protection against waiving privilege Going Forward Develop preservation and production framework Develop preservation and production framework Understand legal obligations to retain electronic records Develop and implement methods for employee training and education Integrate digital forensics electronic preservation program Redact privileged information Electronic production 5
6 Digital Forensics The process of identifying, preserving, analyzing and presenting digital evidence in a manner that is legally acceptable. - McKemmish Digital Forensic Duplication Forensic duplication of a hard drive Must be captured without modification Acquisition method must: Copy the entire media in a bit-by-bit manner Cryptographically seal the evidence to prevent tampering This method is more comprehensive than simply copying all the files from the media and avoids the changes that can be made by using the operating system to make a typical copy. 6
7 Digital Forensic Analysis Forensic analysis Examine drive image to search for targeted content Allows examination of all data including hidden, deleted, system, and unallocated files Access Data Toolkits Valuable experience with the Forensic Toolkit as well as training in forensics fundamentals and AccessData bootcamp. Cisco Certified Network Associate The CCNA certification indicates a foundation in and apprentice knowledge of networking. Center for Information Security NSA designated Center of Excellence in Information Assurance Education. Certified Information Systems Security Professionals This program consists of a series of courses that emphasize security issues and approaches fundamental to the protection of the information infrastructure. Summation Legal Technologies, Inc. Experience with America's number one litigation support software. High Technology Crime Investigation Association World's largest organization for high technology crime investigators. Promotes, aids and affects knowledge about methods, processes, and techniques relating to investigations. Certified Information Systems Security Professionals Professionals certified in the areas of cryptography, physical security, business continuity planning, and law, investigation & ethics, among others. The Microsoft Certified Professional Professionals with the skills to successfully implement a Microsoft product or technology as part of a business solution in an organization. Qualys, Inc. Offers on demand security audit and vulnerability management solutions to organizations of all sizes. Access Data Toolkits Valuable experience with the Forensic Toolkit as well as training in forensics fundamentals and AccessData bootcamp. National IA Education & Training Program A set of criteria designed to measure Information Assurance academic programs and professionals. Computing Technology Industry Association CompTIA certification programs, such as the A+ certification, are the recognized industry standards for foundation-level information technology (IT) skills. 7
8 Contact Information Gavin W. Manes, Ph.D. Oklahoma Digital Forensics Professionals, Inc. President and Director of Research University of Tulsa Center for Information Security Research Assistant Professor 8
E-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case.
E-DISCOVERY The process in which electronic data is sought, located, secured, and analyzed with the intent of using it as evidence in a civil or criminal legal case. I. Guidance Regarding the Amended Federal
More informationOHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE
OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE I. Description of Course: 1. Department/Course: CNET - 174 2. Title: Computer Forensics 3. Cross Reference: 4. Units: 3 Lec Hrs:
More informationFederal Rules of Civil Procedure IT Obligations For
Federal Rules of Civil Procedure IT Obligations For Email Message Logic is a business unit of Data Storage Corporation. 212-564-4922 www.messagelogic.net or www.datastoragecorp.com 2013 Data Storage Corporation,
More informationLegal, Ethical, and Professional Issues in Information Security
Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN
More informationCourse 832 EC-Council Computer Hacking Forensic Investigator (CHFI)
Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming
More informationHow to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO
How to Like E-Discovery, Security and Social Media Dr. Gavin W. Manes, CEO Gavin W. Manes, Ph.D. CEO, Avansic Doctorate in Computer Science from TU Scientific approach to e- discovery Published over fifty
More informationThe Legal Health Record and E-Discovery: Where You Need to Be
The Legal Health Record and E-Discovery: Where You Need to Be Webinar June 9, 2009 Practical Tools for Seminar Learning Copyright 2009 American Health Information Management Association. All rights reserved.
More informationWhen Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.
When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the
More informationCertified Digital Forensics Examiner
Certified Digital Forensics Examiner ACCREDITATIONS EXAM INFORMATION The Certified Digital Forensics Examiner exam is taken online through Mile2 s Assessment and Certification System ( MACS ), which is
More informationExcerpt from Best Practices Guide for ESI Pretrial Discovery - Strategy and Tactics ( ), ESI Discovery, Type and Storage.
Over the next several weeks the E-Discovery Alert will focus on the strategy and tactics for handling sixteen specific ESI issues throughout pretrial discovery. Whether it is a "meet and confer" or request
More informationDIGITAL EVIDENCE TOOL BOX
DIGITAL EVIDENCE TOOL BOX Toolbox Page 1 of 23 Introduction This guide is meant to provide a basic understanding of the industry standards, best practices and practical applications for the use of digital
More informationComputer Forensic Capabilities. Cybercrime Lab Computer Crime and Intellectual Property Section United States Department of Justice
Computer Forensic Capabilities Cybercrime Lab Computer Crime and Intellectual Property Section United States Department of Justice Agenda What is computer forensics? Where to find computer evidence Forensic
More informationRMU-IT-SEC-01 Acceptable Use Policy
1.0 Purpose 2.0 Scope 2.1 Your Rights and Responsibilities 3.0 Policy 3.1 Acceptable Use 3.2 Fair Share of Resources 3.3 Adherence with Federal, State, and Local Laws 3.4 Other Inappropriate Activities
More informationEXAM PREPARATION GUIDE
When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 9001 Lead Auditor www.pecb.com The objective of the PECB Certified ISO 9001 Lead Auditor examination is to ensure that the candidate possesses
More informationDigital Forensics at a University. Calvin Weeks Director, Oklahoma Digital Forensics Lab University of Oklahoma
Digital Forensics at a University Calvin Weeks Director, University of Oklahoma Calvin Weeks Director, Former Director of IT Security Certified EnCASE Examiner (EnCE) VP of the local chapter of HTCIA Co-Chair
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationFrom the Lab to the Boardroom; Forensics goes mainstream
From the Lab to the Boardroom; Forensics goes mainstream Jim Butterworth, EWC USN (Ret.), EnCE & GCIA, Director of Incident Response, Guidance Software Definition: P A G E 1 Computer Forensics The Scientific
More informationCertified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
More informationDigital Forensics. Module 1 CS 996
Digital Forensics Module 1 CS 996 Instructors Dr. Frederick Scholl Office Hours: 5-6 PM, Mondays E-mail: freds@monarch-info.com Phone 212-869-4458 I am not a lawyer! Kulesh Shanmugasundaram Professor Nasir
More informationTHE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.
THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.FFa) BROCHURE Contents INTRODUCTION... 3 THE IICFA... 4 Basic Entry qualifications...
More informationInvestigating Insider Threats
Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior
More informationCase 2:07-cv MMB Document 123 Filed 11/26/2008 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA
Case 2:07-cv-04756-MMB Document 123 Filed 11/26/2008 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA RHOADS INDUSTRIES, INC. : CIVIL ACTION : v. : : NO. 07-4756
More informationInformation Systems and Tech (IST)
Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of
More informationAccessData offers a broad array of training options.
Forensics Training AccessData offers a broad array of training options. Our trainers have more than two centuries of cumulative experience in their respective fields. Take Advantage of the All Access Pass
More informationCertified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Title: Certified Digital Forensics Examiner Duration: 5 days Class Format Options: Instructor-led classroom Live Online Training Prerequisites: A minimum of
More informationPOLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6
POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6 North Gem School District No. 149 establishes the following guidelines to provide administrative direction pertaining to the retention
More informationEXAM PREPARATION GUIDE
EXAM PREPARATION GUIDE PECB Certified ISO 50001 Lead Auditor The objective of the PECB Certified ISO 50001 Lead Auditor examination is to ensure that the candidate has the knowledge and skills to plan
More informationComplete document security
DOCUMENT SECURITY Complete document security Protect your valuable data at every stage of your workflow Toshiba Security Solutions DOCUMENT SECURITY Without a doubt, security is one of the most important
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationManagement Case Study. Kapil Lohia
Email Management Case Study Kapil Lohia ARMA Survey on Information Management Prepared or Not? > Majority of RIM professionals feel unprepared when it comes to email management 72% for ediscovery - 68
More informationCertification, Registration and Education of Digital Forensic Experts
Digital Evidence 2008 26-27 27 June 2008 Certification, Registration and Education of Digital Forensic Experts Peter Sommer London School of Economics peter@pmsommer.com p.m.sommer sommer@lse.ac..ac.uk
More informationCOMPUTER HACKING Forensic Investigator
COMPUTER HACKING Forensic Investigator H.H. Sheik Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E www.ictd.ae ictd@ictd.ae Course Introduction: CHFIv8 presents a detailed methodological approach
More informationTHINGS YOU NEED TO KNOW BEFORE DELVING INTO THE WORLD OF DIGITAL EVIDENCE. Roland Bastin Partner Risk Advisory Deloitte
Inside magazine issue 16 Part 03 - From a risk and cyber perspective perspective Roland Bastin Partner Risk Advisory Deloitte Gunnar Mortier Senior Manager Risk Advisory Deloitte THINGS YOU NEED TO KNOW
More informationHow Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework
More informationNATIONAL INSTITUTE OF FORENSIC SCIENCE
NATIONAL INSTITUTE OF FORENSIC SCIENCE LEGISLATIVE OUTLINE National Institute of Forensic Sciences (NIFS) The NIFS will be responsible for the coordination, administration, and oversight of all of the
More informationBuilding the IA Workforce
Building the IA Workforce Julie Ryan Assistant Professor The George Washington University Washington, DC http://www.seas.gwu.edu/~infosec/ 1 The First Question What s an IA Professional? The IA field is
More informationArticle II - Standards Section V - Continuing Education Requirements
Article II - Standards Section V - Continuing Education Requirements 2.5.1 CONTINUING PROFESSIONAL EDUCATION Internal auditors are responsible for maintaining their knowledge and skills. They should update
More informationAAPA. Legal Issues and Record Retention. SML, Inc. Steve M. Lewis, President and CEO
AAPA Legal Issues and Record Retention May 15, 2013 SML, Inc. Steve M. Lewis, President and CEO 813.205.2850 stevemlewis@msn.com www.smlinfo.net TABLE OF CONTENTS Page CORPORATE OR PUBLIC RECORDS 3 Copy
More informationInformation Security Incident Response Plan
Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,
More informationCyber Risks in the Boardroom Conference
Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks
More informationPreservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues
Electronic Evidence: Preservation, Retrieval & Production Issues Tips, Tactics & Technology April 19, 2004 Discussion Outline 21 st Century Discovery E-Evidence Uncovered Preservation / Spoliation Computer
More informationIllinois Association of Defense Trial Counsel P.O. Box 3144, Springfield, IL IDC Quarterly Vol. 16, No. 4 (16.4.
E-Discovery By:Peter R. Jennetten Quinn, Johnston, Henderson & Pretorius Peoria A Lawyer s Obligation of Truthfulness When Representing a Client in Negotiation Risks and Opportunities This new column will
More informationCOMPUTER FORENSICS THIS IS NOT CSI COLORADO SPRINGS. Frank Gearhart, ISSA Colorado Springs
COMPUTER FORENSICS THIS IS NOT CSI COLORADO SPRINGS Frank Gearhart, ISSA Colorado Springs TECHNOLOGY + INVESTIGATION + STORYTELLING Know the case Find the evidence Follow the facts Create the timeline
More informationEnterprise Vault & e-discovery
Enterprise Vault & Enterprise Vault & e-discovery e-discovery Tim Faith Attorney At Law Tim Faith Attorney At Law Saturday, May 30, 2009 1 Agenda Agenda Implementing Symantec Enterprise Vault Implementing
More informationBuilding the Cybersecurity Workforce. November 2017
Building the Cybersecurity Workforce November 2017 Our Global Footprint Measuring Kaplan University s Educational Impact For every career path +1MM students annually served Facilities in 30+ countries
More informationMichael McCartney, President
Michael McCartney, President Litigation Landscape Computer Forensics Overview Forensic Data vs. Non-Forensic Dangers of Hard Drives Forensic Process HR Escrow Proactive Forensics Pit falls to avoid 1 650
More informationTrends in Mobile Forensics from Cellebrite
Trends in Mobile Forensics from Cellebrite EBOOK 1 Cellebrite Survey Cellebrite is a well-known name in the field of computer forensics, and they recently conducted a survey as well as interviews with
More informationCCISO Blueprint v1. EC-Council
CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance
More informationEXAM PREPARATION GUIDE
When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO/IEC 20000 Lead Auditor www.pecb.com The objective of the Certified ISO/IEC 20000 Lead Auditor examination is to ensure that the candidate
More informationCredit Card Data Compromise: Incident Response Plan
Credit Card Data Compromise: Incident Response Plan Purpose It is the objective of the university to maintain secure financial transactions. In order to comply with state law and contractual obligations,
More informationM.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program
Detroit Mercy s Master of Science in Information Assurance with a major in Cybersecurity is a multi-disciplinary 30-credit-hour graduate degree. It is designed to produce a comprehensively knowledgeable
More informationUTAH VALLEY UNIVERSITY Policies and Procedures
Page 1 of 6 POLICY TITLE Section Subsection Responsible Office Retention of Electronic Files Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Finance
More informationBACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY
Bachelor of Science in Information Technology BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Description and Outcomes The objective of the Bachelor of Science in Information Technology program is to help
More informationTOP TRENDING THE MAGAZINE. Menu. 1 of 6 6/7/16 4:38 PM. Keep it Simple, Legal. A New Role Bridging Business and Legal at Shell
Menu TOP TRENDING 1 2 3 4 5 Keep it Simple, Legal A New Role Bridging Business and Legal at Shell GC Perspectives on Legal Operations LGBT Employee Considerations Outside the United States How to Act when
More informatione-discovery Forensics Incident Response
e-discovery Forensics Incident Response NetSecurity Corporation Inno Eroraha, Chief Strategist 22375 Broderick Drive Suite 235 Dulles, VA 20166 SBA 8(a) Certified SDB GSA Contract # GS-35F-0288Y VA DCJS
More informationDevelopment of your Company s Record Information System and Disaster Preparedness. The National Emergency Management Summit
Development of your Company s Record Information System and Disaster Preparedness The National Emergency Management Summit Thomas D. Anthony Frost Brown Todd LLC Attorneys at Law 201 E. Fifth Street Cincinnati,
More informationHire Counsel + ACEDS. Unified Team, National Footprint Offices. ediscovery Centers
Unified Team, National Footprint Offices Boston, MA Charlotte, NC Chicago, IL Darien, CT Los Angeles, CA Miami, FL Morrisville, NC New York, NY Philadelphia, PA San Francisco, CA Southfield, MI Washington,
More informationDIABLO VALLEY COLLEGE CATALOG
COMPUTER NETWORK TECHNOLOGY CNT Despina Prapavessi, Dean Math and Computer Sciences Division Math Building, Room 267 Possible career opportunities These CNT-courses prepare students for a career path in
More informationSAMPLE LITIGATION HOLD NOTICES
Business & Litigation Support ediscovery: COLORADO RULES, CASE LAW & SAMPLE LITIGATION HOLD NOTICES HTTPS://SHOLLEREDWARDS.COM/LITIGATION-AND-SUPPORT/ 1.855.649.5884 CONTENTS Litigation Trigger... 3 Scope
More informationThe Evolving Threat to Corporate Cyber & Data Security
The Evolving Threat to Corporate Cyber & Data Security Presented by: Sara English, CIPP/US Sara.English@KutakRock.com 1 http://blogs.wsj.com/law/2015/12/09/employee error leading cause of data breaches
More informationInformation Security Incident Response Plan
Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,
More informationITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018
GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences
More informationPROVIDING INVESTIGATIVE SOLUTIONS
PROVIDING INVESTIGATIVE SOLUTIONS Experienced Professionals Northeast Intelligence Group, Inc. (NEIG) has been helping clients meet challenges for more than twenty years. By providing meaningful and timely
More informationManaging Your Record Retention Policy Safely
Managing Your Record Retention Policy Safely Client and counsel have a duty to preserve materials with potential evidentiary value. The preceding discussion told us about the duties of lawyers and clients
More informationEXAM PREPARATION GUIDE
When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 14001 Lead Auditor www.pecb.com The objective of the PECB Certified ISO 14001 Lead Auditor examination is to ensure that the candidate
More informationCYBERSECURITY: Scholarship and Job Opportunities
CYBERSECURITY: Scholarship and Job Opportunities Malware Invasion in Cyberspace Blackhole Malware Exploit Kit (2012) Shamoon Virus (2012) Stuxnet Worm (2010) Operation Aurora (2009) and many others Job
More informationEXAM PREPARATION GUIDE
When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22000 Lead Auditor www.pecb.com The objective of the Certified ISO 22000 Lead Auditor examination is to ensure that the candidate has
More informationPROFILE: ACCESS DATA
COMPANY PROFILE PROFILE: ACCESS DATA MARCH 2011 AccessData Group provides digital investigations and litigation support software and services for corporations, law firms, law enforcement, government agencies
More informationComputer forensics Aiman Al-Refaei
Computer forensics Aiman Al-Refaei 29.08.2006 Computer forensics 1 Computer forensics Definitions: Forensics - The use of science and technology to investigate and establish facts in criminal or civil
More informationWhistleblower Submission Form
Whistleblower Submission Form FORM C Complete this form IF you are a lawyer a whistleblower (or a group of whistleblowers) who wish to be anonymous. If you are a individual whistleblower, please complete
More informationThe Trail of Electrons
E-Records E-Mail E-Discovery The Trail of Electrons ML Taylor, C.P.M. February 2013 January 2013 ML Taylor, C.P.M. 1 Objectives 1. Raise awareness of the issues surrounding the use of email and electronic
More informationSTRIPPING METADATA: WHAT EVERY ATTORNEY SHOULD KNOW-A WEBINAR
STRIPPING METADATA: WHAT EVERY ATTORNEY SHOULD KNOW-A WEBINAR Judith Germano, Esq. Member, New Jersey Supreme Court s Working Group on Ethical Issues Involving Metadata in Electronic Documents Germano
More informationForensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services
Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic
More informationEXAM PREPARATION GUIDE
When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO/IEC 27001 Lead Auditor www.pecb.com The objective of the Certified ISO/IEC 27001 Lead Auditor examination is to ensure that the candidate
More informationInstitute of Certified Forensic Accountants. Certificate in Internal Auditing
Institute of Certified Forensic Accountants Certificate in Internal Auditing www.forensicglobal.org info@forensicglobal.org Welcome The Institute of Certified Forensic Accountants is a professional body
More informationChecklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery
Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery To aid and advance the ability for a litigation to successfully employ computer-based discovery, Rule 16(c) of the Federal Rules
More informationCyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security
CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research
More informationAtlantic Bylaw Officers Association
Atlantic Bylaw Officers Association Certification Program Page 1 of 18 Table of Contents The ABOA Certification Program... 3 Introduction... 3 Pre-Requisites when Applying for Certification... 9 Experience...
More informationDigital Forensics for Attorneys
Lars E. Daniel, EnCE, ACE, AME, CTNS Digital Forensics Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital
More informationDeveloping Your Records Retention Schedule: It s Bigger Than Just Health Records
Developing Your Records Retention Schedule: It s Bigger Than Just Health Records Webinar August 11, 2009 Copyright 2009 American Health Information Management Association. All rights reserved. Disclaimer
More informationFinancial CISM. Certified Information Security Manager (CISM) Download Full Version :
Financial CISM Certified Information Security Manager (CISM) Download Full Version : http://killexams.com/pass4sure/exam-detail/cism required based on preliminary forensic investigation, but doing so as
More informationInstructions: Request for Documents
Instructions: Request for Documents These forms were prepared by the Justice & Diversity Center, a nonprofit organization, and are not official court forms. Checklist This packet provides a general form
More informationCian Kinsella CEO, Digiprove
Cian Kinsella CEO, Digiprove cian.kinsella@digiprove.com Malaga 7 th June 2013 Been developing software since 1972 Commercial and Freelance Co-founder of 3 Software Product Companies Have had many different
More informationMYTH vs. REALITY The Revised Cybersecurity Act of 2012, S. 3414
MYTH vs. REALITY The Revised Cybersecurity Act of 2012, S. 3414 The Cybersecurity Act of 2012, S. 3414, has not been the subject of a legislative hearing and has skipped regular order. HSGAC has not marked
More informationCase 1:07-cv HHK-JMF Document 67 Filed 04/24/2008 Page 1 of 9 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA
Case 1:07-cv-01707-HHK-JMF Document 67 Filed 04/24/2008 Page 1 of 9 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA CITIZENS FOR RESPONSIBILITY AND ETHICS IN WASHINGTON, v. Plaintiff, Civil Action
More informationHandling Large Data Sets
Handling Large Data Sets Computer Forensics & Electronic Discovery Rob Weston My Background Police Forensic Consultancy Kroll Ontrack Palmer Legal Technologies Today s Talk Forensics and E-Discovery Modern
More informationEXAM PREPARATION GUIDE
EXAM PREPARATION GUIDE PECB Certified ISO 39001 Lead Auditor The objective of the PECB Certified ISO 39001 Lead Auditor examination is to ensure that the candidate has the knowledge and skills to plan
More informationCircling the Wagons. How to Implement an Effective Litigation Hold. Copyright 2006 IE Discovery, Inc. All rights reserved.
Circling the Wagons How to Implement an Effective Litigation Hold Copyright 2006 IE Discovery, Inc. All rights reserved. Agenda Importance of Document Retention Plan Litigation Hold Best Practices Case
More informationPARALEGAL CERTIFICATIONS. National Professional Standard for Paralegals
PARALEGAL CERTIFICATIONS National Professional Standard for Paralegals 1 OUR MISSION NALA leads the paralegal profession by providing a voluntary certification program, continuing legal education, and
More informationPARALEGAL CERTIFICATIONS. National Professional Standard for Paralegals
PARALEGAL CERTIFICATIONS National Professional Standard for Paralegals 1 OUR MISSION NALA leads the paralegal profession by providing a voluntary certification program, continuing legal education, and
More informationEXAM PREPARATION GUIDE
EXAM PREPARATION GUIDE PECB Certified ISO/IEC 17025 Lead Auditor The objective of the PECB Certified ISO/IEC 17025 Lead Auditor examination is to ensure that the candidate possesses the needed expertise
More informationCITADEL INFORMATION GROUP, INC.
CITADEL INFORMATION GROUP, INC. The Role of the Information Security Assessment in a SAS 99 Audit Stan Stahl, Ph.D. President Citadel Information Group, Inc. The auditor has a responsibility to plan and
More informationWhite Paper Digital Evidence Preservation and Distribution: Updating the Analog System for the Digital World July 2011
White Paper Digital Evidence Preservation and Distribution: Updating the Analog System for the Digital World July 2011 I. Introduction A majority of crimes committed today have a digital component, and
More informationUnderstanding Computer Forensics
Understanding Computer Forensics also known as: How to do a computer forensic investigation... and not get burned Nick Klein SANS Canberra Community Night 11 February 2013 The scenario... Your boss tells
More informationIT Technician Pathways Course Guide
IT Technician Pathways Course Guide Stage Computer Retail Sales and Support Course Name or Topic Introduction to Retail or Business Fundamentals Related 3 rd Party Certifications C-ID IT-MC C-ID BUS 100
More informationPalo Alto Unified School District OCR Reference No
Resolution Agreement Palo Alto Unified School District OCR Reference No. 09-17-1194 The Office for Civil Rights (OCR) of the U.S. Department of Education initiated an investigation into an allegation that
More informationSyllabus: The syllabus is broadly structured as follows:
Syllabus: The syllabus is broadly structured as follows: SR. NO. TOPICS SUBTOPICS 1 Foundations of Network Security Principles of Network Security Network Security Terminologies Network Security and Data
More informationCYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018
CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,
More informationMark Your Calendars: NY Cybersecurity Regulations to Go into Effect
Mark Your Calendars: NY Cybersecurity Regulations to Go into Effect CLIENT ALERT January 25, 2017 Angelo A. Stio III stioa@pepperlaw.com Sharon R. Klein kleins@pepperlaw.com Christopher P. Soper soperc@pepperlaw.com
More informationCertified Cyber Security Specialist
Certified Cyber Security Specialist Page 1 of 7 Why Attend This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal
More information